diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2017-11-29 11:28:09 -0800 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2017-11-29 11:28:09 -0800 |
commit | ef0010a30935de4e0211cbc7bdffc30446cdee9b (patch) | |
tree | 8390d91f247b724dd00ad91f25d8bcf391e3a52c /include/net/scm.h | |
parent | 668533dc0764b30c9dd2baf3ca800156f688326b (diff) | |
download | linux-stable-ef0010a30935de4e0211cbc7bdffc30446cdee9b.tar.gz linux-stable-ef0010a30935de4e0211cbc7bdffc30446cdee9b.tar.bz2 linux-stable-ef0010a30935de4e0211cbc7bdffc30446cdee9b.zip |
vsprintf: don't use 'restricted_pointer()' when not restricting
Instead, just fall back on the new '%p' behavior which hashes the
pointer.
Otherwise, '%pK' - that was intended to mark a pointer as restricted -
just ends up leaking pointers that a normal '%p' wouldn't leak. Which
just make the whole thing pointless.
I suspect we should actually get rid of '%pK' entirely, and make it just
work as '%p' regardless, but this is the minimal obvious fix. People
who actually use 'kptr_restrict' should weigh in on which behavior they
want.
Cc: Tobin Harding <me@tobin.cc>
Cc: Kees Cook <keescook@chromium.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'include/net/scm.h')
0 files changed, 0 insertions, 0 deletions